Fixed VoIP and Non-Fixed VoIP: Know the difference

VoIP has become commonplace in the commercial and personal world in recent times.   Businesses, large and small, have taken to VoIP because of the cost and business benefits it brings.   Simply put, it avoids the costs associated with PSTN connections by routing communications over the Internet.  This allows VoIP service providers to bundle in other features such as free or low-cost long-distance and international calls.

In addition to providing on-premises VoIP calls, the digital format of VoIP provides connectivity for WiFi-enabled smart devices such as smartphones and tablets.  Remote and home working have increased significantly because of the Covid epidemic, and VoIP over public and private WiFi networks and VPN connections are rapidly becoming the norm.Continue reading

How Does Eavesdropping Exploit Affect Your VoIP Phone

How Does Eavesdropping Exploit Affect Your VoIP Phone

Business and home users have taken to VoIP like ducks to water. To both, it offers cost savings and convenience. To businesses, it provides the opportunity to use advanced communications features over and above the traditional land-line POTS solution. Rolling out toll-free International calling and video-conferencing, providing advanced call management to customer support centres and improving their overall business profile is now achievable and a modest and controllable cost.

Originally needing big iron, small businesses can run a virtual PBX on a dedicated desktop PC and take advantage of those new offerings.

However, as with all digital advances, security comes into play and VoIP Security is no exception.Continue reading

What you ought to know about VoIP Fraud

What You Ought to Know about VoIP Fraud

VoIP Communication is a common feature in corporate and personal life nowadays.  Most large concerns use it as a matter of course as part of their corporate integrated communications platform.

In the past, communications costs were inflated by unauthorised calls and other activities designed to get around telephone security policies. It’s no different today in VoIP Communications.  People still try to make unauthorised calls inside the organisation, and people try to hijack the company communications networks to make their calls.  Nothing really new, except that it’s now digital.Continue reading

How to protect VoIP from scammers

How to protect VoIP from scammers

VoIP for Business provides a range of benefits, including substantial cost-savings that make it a must-have for most businesses.  However, as with most IT advances, VoIP has attracted the dark side of the developers.   Hackers and scammers are using VoIP for Business as a way to steal data and execute hacking exploits.

As with other types of malware attacks, business need to be aware of how these exploits are executed and what preventative measures they can take.

The first thing to understand is that most successful hacking attacks are by having users provide sensitive information. Scammers are becoming more sophisticated, and they are increasingly using VoIP to steal personal and company data or just cause mischief.Continue reading

Identifying and defending your system from vulnerabilities

VoIP Security: Identifying and defending your system from vulnerabilities

First we had viruses, then rootkits, now we have ransomware.  One thing is certain, the next bit of malware technology is currently under development and be with us soon. Even systems like VoIP are under attack and are being used as portals to gain access to corporate information. 

What kind of threats are currently being seen in VoIP systems and how are they to be countered? 

The first thing to understand that because VoIP is based on IP technologies it is vulnerable to all the malware and attack techniques that are inflicted on IP networks.  The second is that VoIP goes over the Internet, and while you can contain and manage IP security in your internal closed corporate network, you are at the mercy of third-party service providers of varying quality in their security systems.  The third, and one often forgotten, is that all devices in the VoIP network are IP devices and are therefore vulnerable to all the threats found with other IP devices. That must be factored into the overall data and voice protection scenario.Continue reading